Enterprise Leadership
Filter Content:
Categories:
Tags:
March 14, 2022 | Webinar Replays
David Raviv, host of NYIS Meetup, Snehal Antani, CEO and Co-founder of Horizon3, Steve Ramey of Arete Advisors LLC, and…February 19, 2022 | Whitepapers
Defense in depth is a proven strategy for protecting systems and software from insider and external attacks.January 29, 2022 | Webinar Replays
On January 28, 2022, CEO and Co-founder Snehal Antani sat down with host David Raviv of NY Information Security Meetup…October 25, 2021 | Blogs
Are your credential policies implemented right? Are your enterprise accounts configured correctly? How do you know? Most phishing, ransomware, and…October 7, 2021 | Infographics
September 19, 2021 | Whitepapers
The hardest part of cyber security is deciding what NOT to do. Being vulnerable doesn’t mean you’re exploitable.September 10, 2021 | Whitepapers
Credential attacks bypass traditional defenses and cause billions in damage. Learn why they work, what’s at risk, and how Horizon3.ai…August 17, 2021 | Whitepapers
Learn why regulatory compliance is not enough for true cybersecurity. Discover how continuous automated pentesting and network segmentation help you…July 29, 2021 | Blogs
Being a #learnitall, Lesson 1: Be Open to Be Wow’d Most of the startup advice out there is pretty clear: get…February 23, 2021 | Blogs
Purple teaming is the result of collaboration, communication and sharing of information between a red team and a blue team…